Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adversary Models
biblio
Collaborative Adversarial Modeling for Spectrum Aware IoT Communications
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Pareto-optimal adversarial strategy design
cooperative communication
cooperative spectrum sensing
DSA paradigm
dynamic spectrum access
dynamic spectrum access based networks
environmental sensing capability
inherent DSA vulnerabilities
large scale future 5G Internet of Things
leader-follower game
Pareto optimisation
collaborative SSDF attack
radio spectrum management
selfish adversarial model
selfish adversary
signal detection
spectrum availability estimation
spectrum aware 5G vision
spectrum aware IoT applications
spectrum aware IoT communications
spectrum sensing data falsification attacks
Adversary Models
collaboration
Internet of Things
security
Computational modeling
Games
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hardware
5G mobile communication
IoT networks
sensors
telecommunication security
cognitive radio
wireless channels
adversarial system utility components
collaborative adversarial modeling
collaborative attacks
collaborative group
collaborative selfish adversaries
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
biblio
On Detecting Manifestation of Adversary Characteristics
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
Adversary characteristics
Adversary Models
Communication system security
computer security
Data models
Human behavior
machine learning
Metrics
Predictive models
pubcrawl
Resiliency
risk-averse
Scalability
tools
Training
Wireless communication
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity
biblio
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Submitted by grigby1 on Mon, 03/19/2018 - 1:00pm
jamming detection
Wireless communication
Stochastic processes
stochastic games
secret communication
Scalability
Resiliency
resilience
reliable wireless communication
Reliability
pubcrawl
physical layer security
Metrics
legitimate transmission link
Adversary Models
jamming attack
Jamming
intrusion detection system
Human behavior
Games
game theory
game theoretical framework
Eavesdropping detection
eavesdropping
dual detection techniques
computer network security
Communication system security
biblio
On Protecting Location Secrecy
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
LSM
wireless localization network
Wireless communication
telecommunication security
Scalability
Resiliency
resilience
pubcrawl
privacy
Position measurement
Particle measurements
mobility management (mobile radio)
Metrics
Adversary Models
location secrecy metric
Location secrecy
location information
localization process
localization
Human behavior
general measurement model
eavesdropper
Communication system security
channel conditions
Atmospheric measurements
Algorithm design and analysis
biblio
A Novel Hybrid Delay Based Physical Unclonable Function Immune to Machine Learning Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Monitoring
wireless sensor networks
Temperature sensors
Temperature measurement
Temperature distribution
Scalability
Ring oscillators
Resiliency
resilience
pubcrawl
NIST
Adversary Models
Modeling Attacks
Metrics
Hybrid PUF
Humidity
Human behavior
Hardware Security
FPGA
arbiter PUF
Agriculture
biblio
Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Metrics
state estimation
Scalability
Resiliency
resilience
pubcrawl
power transmission control
power system state estimation
power grids
power grid state estimation
Phase measurement
phase angle measurements
optimization
Numerical models
AC power flow model
Mathematical model
load flow control
line failures detection problem
IEEE 300-bus systems
IEEE 118-bus systems
Human behavior
failure analysis
Cyber-physical attack
convex programming
convex optimization problem
Convex functions
Adversary Models
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
power system state estimation
Transmission line measurements
Topology
state variable target
state estimation
specific targets
smart power grids
Smart Grid
security of data
secure operation
Scalability
Resiliency
resilience
Q measurement
pubcrawl
pre-specified meter target
adversary
power system security
power engineering computing
network topology
Metrics
Meters
Manganese
Human behavior
grid operator
false data injection attack
economic operation
DC model
cyber-attacks
attacking vector
Adversary Models
« first
‹ previous
1
2
3
4
5
6
next ›
last »